Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data collection for attack detection and security measurement in mobile ad hoc networks: A survey
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
A survey of attacks and countermeasures in mobile ad hoc networks
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
A typical wireless sensor node has little protection against radio jamming. The situation
becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the …
becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the …
A context‐aware internet of things‐driven security scheme for smart homes
In recent years, the Internet of Things (IoT) has become very popular as it has numerous
applications in the industrial and research domain. Moreover, the features of IoT systems …
applications in the industrial and research domain. Moreover, the features of IoT systems …
Comprehensive review on distributed denial of service attacks in wireless sensor networks
S Subramani, M Selvi - International Journal of Information …, 2023 - inderscienceonline.com
Distributed denial of service (DDoS) is the most popular disruptive type of attack in wireless
sensor networks (WSNs). It is extremely harmful for the functioning of the network, since it …
sensor networks (WSNs). It is extremely harmful for the functioning of the network, since it …
The sleep deprivation attack in sensor networks: Analysis and methods of defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending
network longevity. We show how adversary nodes can exploit clustering algorithms to …
network longevity. We show how adversary nodes can exploit clustering algorithms to …
GDVAN: a new greedy behavior attack detection algorithm for VANETs
Vehicular Ad hoc Networks (VANETs), whose main objective is to provide road safety and
enhance the driving conditions, are exposed to several kinds of attacks such as Denial of …
enhance the driving conditions, are exposed to several kinds of attacks such as Denial of …
Attacks and countermeasures in sensor networks: a survey
A wireless sensor network (WSN) comprises a large number of sensors that collaboratively
monitor various environments. The sensors all together provide global views of the …
monitor various environments. The sensors all together provide global views of the …
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless
networks in distributed communities, where no notion of trust can be assumed, are the main …
networks in distributed communities, where no notion of trust can be assumed, are the main …
Security issues in flying ad-hoc networks (FANETS)
Abstract Technological advancements in Unmanned Aerial Vehicles (UAV) encourage the
use of multi-UAV systems in military and civil applications. The most important benefit of the …
use of multi-UAV systems in military and civil applications. The most important benefit of the …